default search action
Esfandiar Mohammadi
Person information
- affiliation: University of Lübeck, Germany
- affiliation (former): Saarland University, Saarbrücken, Germany
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c21]Debajyoti Das, Sebastian Meiser, Esfandiar Mohammadi, Aniket Kate:
Divide and Funnel: A Scaling Technique for Mix-Networks. CSF 2024: 49-64 - [c20]Max Schulze, Yorck Zisgen, Moritz Kirschte, Esfandiar Mohammadi, Agnes Koschmider:
Differentially Private Inductive Miner. ICPM 2024: 89-96 - [i19]Max Schulze, Yorck Zisgen, Moritz Kirschte, Esfandiar Mohammadi, Agnes Koschmider:
Differentially Private Inductive Miner. CoRR abs/2407.04595 (2024) - 2023
- [c19]Nele Sophie Brügge, Esfandiar Mohammadi, Alexander Münchau, Tobias Bäumer, Christian Frings, Christian Beste, Veit Rößner, Heinz Handels:
Towards Privacy and Utility in Tourette TIC Detection Through Pretraining Based on Publicly Available Video Data of Healthy Subjects. ICASSP 2023: 1-5 - [c18]Markus Bertl, Yngve Lamo, Martin Leucker, Tiziana Margaria, Esfandiar Mohammadi, Suresh Kumar Mukhiya, Ludwig Pechmann, Gunnar Piho, Fazle Rabbi:
Challenges for AI in Healthcare Systems. AISoLA (Selected Papers) 2023: 165-186 - [i18]Yara Schütt, Johannes Liebenow, Tanya Braun, Marcel Gehrke, Florian Thaeter, Esfandiar Mohammadi:
DPM: Clustering Sensitive Data through Separation. CoRR abs/2307.02969 (2023) - [i17]Moritz Kirschte, Thorsten Peinemann, Joshua Stock, Carlos Cotrini, Esfandiar Mohammadi:
S-GBDT: Frugal Differentially Private Gradient Boosting Decision Trees. CoRR abs/2309.12041 (2023) - [i16]Johannes Liebenow, Timothy Imort, Yannick Fuchs, Marcel Heisel, Nadja Käding, Jan Rupp, Esfandiar Mohammadi:
A Toolchain for Privacy-Preserving Distributed Aggregation on Edge-Devices. CoRR abs/2309.12483 (2023) - [i15]Reyhane Attarian, Esfandiar Mohammadi, Tao Wang, Emad Heydari Beni:
MixFlow: Assessing Mixnets Anonymity with Contrastive Architectures and Semantic Network Information. IACR Cryptol. ePrint Arch. 2023: 199 (2023) - 2022
- [j4]Eike Petersen, Yannik Potdevin, Esfandiar Mohammadi, Stephan Zidowitz, Sabrina Breyer, Dirk Nowotka, Sandra Henn, Ludwig Pechmann, Martin Leucker, Philipp Rostalski, Christian Herzog:
Responsible and Regulatory Conform Machine Learning for Medicine: A Survey of Challenges and Solutions. IEEE Access 10: 58375-58418 (2022) - [i14]Moritz Kirschte, Sebastian Meiser, Saman Ardalan, Esfandiar Mohammadi:
Single SMPC Invocation DPHelmet: Differentially Private Distributed Learning on a Large Scale. CoRR abs/2211.02003 (2022) - 2021
- [i13]Eike Petersen, Yannik Potdevin, Esfandiar Mohammadi, Stephan Zidowitz, Sabrina Breyer, Dirk Nowotka, Sandra Henn, Ludwig Pechmann, Martin Leucker, Philipp Rostalski, Christian Herzog:
Responsible and Regulatory Conform Machine Learning for Medicine: A Survey of Technical Challenges and Solutions. CoRR abs/2107.09546 (2021) - [i12]David M. Sommer, Lukas Abfalterer, Sheila Zingg, Esfandiar Mohammadi:
Learning Numeric Optimal Differentially Private Truncated Additive Mechanisms. CoRR abs/2107.12957 (2021) - [i11]Debajyoti Das, Sebastian Meiser, Esfandiar Mohammadi, Aniket Kate:
Divide and Funnel: a Scaling Technique for Mix-Networks. IACR Cryptol. ePrint Arch. 2021: 1685 (2021) - 2020
- [j3]Debajyoti Das, Sebastian Meiser, Esfandiar Mohammadi, Aniket Kate:
Comprehensive Anonymity Trilemma: User Coordination is not enough. Proc. Priv. Enhancing Technol. 2020(3): 356-383 (2020)
2010 – 2019
- 2019
- [j2]David M. Sommer, Sebastian Meiser, Esfandiar Mohammadi:
Privacy Loss Classes: The Central Limit Theorem in Differential Privacy. Proc. Priv. Enhancing Technol. 2019(2): 245-269 (2019) - [c17]David M. Sommer, Aritra Dhar, Luka Malisa, Esfandiar Mohammadi, Daniel Ronzani, Srdjan Capkun:
Deniable Upload and Download via Passive Participation. NSDI 2019: 649-666 - [i10]Damien Desfontaines, Elisabeth Krahmer, Esfandiar Mohammadi:
Passive and active attackers in noiseless privacy. CoRR abs/1905.00650 (2019) - 2018
- [c16]Sebastian Meiser, Esfandiar Mohammadi:
Tight on Budget?: Tight Bounds for r-Fold Approximate Differential Privacy. CCS 2018: 247-264 - [c15]David M. Sommer, Sebastian Meiser, Esfandiar Mohammadi:
PrivacyBuDe: Privacy Buckets Demo Tight Differential Privacy Guarantees made Simple. CCS 2018: 2192-2194 - [c14]Debajyoti Das, Sebastian Meiser, Esfandiar Mohammadi, Aniket Kate:
Anonymity Trilemma: Strong Anonymity, Low Bandwidth Overhead, Low Latency - Choose Two. IEEE Symposium on Security and Privacy 2018: 108-126 - [i9]David M. Sommer, Esfandiar Mohammadi, Sebastian Meiser:
Privacy Loss Classes: The Central Limit Theorem in Differential Privacy. IACR Cryptol. ePrint Arch. 2018: 820 (2018) - 2017
- [c13]David M. Sommer, Aritra Dhar, Luka Malisa, Esfandiar Mohammadi, Daniel Ronzani, Srdjan Capkun:
CoverUp: Privacy Through "Forced" Participation in Anonymous Communication Networks. AsiaCCS 2017: 3 - [i8]David M. Sommer, Aritra Dhar, Luka Malisa, Esfandiar Mohammadi, Daniel Ronzani, Srdjan Capkun:
CoverUp: Privacy Through "Forced" Participation in Anonymous Communication Networks. IACR Cryptol. ePrint Arch. 2017: 191 (2017) - [i7]Debajyoti Das, Sebastian Meiser, Esfandiar Mohammadi, Aniket Kate:
Anonymity Trilemma: Strong Anonymity, Low Bandwidth Overhead, Low Latency - Choose Two. IACR Cryptol. ePrint Arch. 2017: 954 (2017) - [i6]Sebastian Meiser, Esfandiar Mohammadi:
Ratio Buckets: A Numeric Method for r-Fold Tight Differential Privacy. IACR Cryptol. ePrint Arch. 2017: 1034 (2017) - 2016
- [b1]Esfandiar Mohammadi:
Abstracting cryptographic protocols. Saarland University, 2016 - [j1]Michael Backes, Aniket Kate, Praveen Manoharan, Sebastian Meiser, Esfandiar Mohammadi:
AnoA: A Framework for Analyzing Anonymous Communication Protocols. J. Priv. Confidentiality 7(2) (2016) - [c12]Michael Backes, Robert Künnemann, Esfandiar Mohammadi:
Computational Soundness for Dalvik Bytecode. CCS 2016: 717-730 - [i5]Michael Backes, Robert Künnemann, Esfandiar Mohammadi:
Computational Soundness for Dalvik Bytecode. CoRR abs/1608.04362 (2016) - 2015
- [c11]Michael Backes, Simon Koch, Sebastian Meiser, Esfandiar Mohammadi, Christian Rossow:
POSTER: In the Net of the Spider: Measuring the Anonymity-Impact of Network-level Adversaries Against Tor. CCS 2015: 1626-1628 - [c10]Michael Backes, Fabian Bendun, Matteo Maffei, Esfandiar Mohammadi, Kim Pecina:
Symbolic Malleable Zero-Knowledge Proofs. CSF 2015: 412-426 - [c9]Michael Backes, Esfandiar Mohammadi, Tim Ruffing:
Computational Soundness for Interactive Primitives. ESORICS (1) 2015: 125-145 - 2014
- [c8]Michael Backes, Aniket Kate, Sebastian Meiser, Esfandiar Mohammadi:
(Nothing else) MATor(s): Monitoring the Anonymity of Tor's Path Selection. CCS 2014: 513-524 - [c7]Michael Backes, Praveen Manoharan, Esfandiar Mohammadi:
TUC: Time-Sensitive and Modular Analysis of Anonymous Communication. CSF 2014: 383-397 - [c6]Michael Backes, Esfandiar Mohammadi, Tim Ruffing:
Computational Soundness Results for ProVerif - Bridging the Gap from Trace Properties to Uniformity. POST 2014: 42-62 - [i4]Michael Backes, Aniket Kate, Praveen Manoharan, Sebastian Meiser, Esfandiar Mohammadi:
AnoA: A Framework For Analyzing Anonymous Communication Protocols. IACR Cryptol. ePrint Arch. 2014: 87 (2014) - [i3]Michael Backes, Aniket Kate, Sebastian Meiser, Esfandiar Mohammadi:
(Nothing else) MATor(s): Monitoring the Anonymity of Tor's Path Selection. IACR Cryptol. ePrint Arch. 2014: 621 (2014) - 2013
- [c5]Michael Backes, Aniket Kate, Praveen Manoharan, Sebastian Meiser, Esfandiar Mohammadi:
AnoA: A Framework for Analyzing Anonymous Communication Protocols. CSF 2013: 163-178 - [c4]Michael Backes, Dario Fiore, Esfandiar Mohammadi:
Privacy-Preserving Accountable Computation. ESORICS 2013: 38-56 - [i2]Michael Backes, Praveen Manoharan, Esfandiar Mohammadi:
TUC: Time-sensitive and Modular Analysis of Anonymous Communication. IACR Cryptol. ePrint Arch. 2013: 664 (2013) - 2012
- [c3]Michael Backes, Ian Goldberg, Aniket Kate, Esfandiar Mohammadi:
Provably Secure and Practical Onion Routing. CSF 2012: 369-385 - [c2]Michael Backes, Aniket Kate, Esfandiar Mohammadi:
Ace: an efficient key-exchange protocol for onion routing. WPES 2012: 55-64 - 2011
- [i1]Michael Backes, Ian Goldberg, Aniket Kate, Esfandiar Mohammadi:
Provably Secure and Practical Onion Routing. IACR Cryptol. ePrint Arch. 2011: 308 (2011) - 2010
- [c1]Michael Backes, Matteo Maffei, Esfandiar Mohammadi:
Computationally Sound Abstraction and Verification of Secure Multi-Party Computations. FSTTCS 2010: 352-363
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-11 21:30 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint